Continuous monitoring of threats, vulnerabilities, or compromises of client networks in real time and capability to exploit future threats.
(Use Case – in development)